First published: Tue Jan 16 2018(Updated: )
In K7 Antivirus Premium before 15.1.0.53, user-controlled input can be used to allow local users to write to arbitrary memory locations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
K7 Computing AntiVirus | <15.1.0.53 | |
K7 Computing AntiVirus | <15.1.0308 | |
k7computing endpoint | <14.2.0137 | |
K7 Computing Internet Security | <15.1.0297 | |
K7 Computing Total Security | <15.1.0324 | |
K7 Computing Total Security | <16.0.0131 | |
K7 Ultimate Security | <15.1.0324 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16556 is classified as a high severity vulnerability due to its potential to allow arbitrary memory writes.
To fix CVE-2017-16556, update K7 Antivirus Premium, Internet Security, Total Security, or Endpoint Protection to the latest version beyond 15.1.0.53 or the specified affected versions.
CVE-2017-16556 affects K7 Antivirus Premium, K7 Internet Security, K7 Total Security, K7 Endpoint Protection, and K7 Ultimate Security.
Local users of vulnerable versions of K7 products are at risk of exploitation due to CVE-2017-16556.
While there are no public exploits attributed to CVE-2017-16556, its nature poses a significant risk if left unpatched.